463 research outputs found
The Christian leader as a spirit-driven visionary
https://place.asburyseminary.edu/ecommonsatsdissertations/1116/thumbnail.jp
Were rivers flowing across the Sahara during the last interglacial? Implications for human migration through Africa.
Human migration north through Africa is contentious. This paper uses a novel palaeohydrological and hydraulic modelling approach to test the hypothesis that under wetter climates c.100,000 years ago major river systems ran north across the Sahara to the Mediterranean, creating viable migration routes. We confirm that three of these now buried palaeo river systems could have been active at the key time of human migration across the Sahara. Unexpectedly, it is the most western of these three rivers, the Irharhar river, that represents the most likely route for human migration. The Irharhar river flows directly south to north, uniquely linking the mountain areas experiencing monsoon climates at these times to temperate Mediterranean environments where food and resources would have been abundant. The findings have major implications for our understanding of how humans migrated north through Africa, for the first time providing a quantitative perspective on the probabilities that these routes were viable for human habitation at these times
Project Management Framework to Organizational Transitions
This paper describes a project management framework and associated models for organizational transitions. The framework contains an integrated set of steps an organization can take to lead an organizational transition such as downsizing and change in mission or role. The framework is designed to help an organization do the right work the right way with the right people at the right time. The underlying rationale for the steps in the framework is based on a set of findings which include: defining a transition as containing both near-term and long-term actions, designing actions which respond to drivers and achieve desired results, aligning the organization with the external environment, and aligning the internal components of the organization. The framework was developed based on best practices found in the literature, lessons learned from heads of organizations who have completed large-scale organizational changes, and concerns from employees at the Kennedy Space Center (KSC). The framework is described using KSC
A multi-physics method for fracture and fragmentation at high strain-rates
This work outlines a diffuse interface method for the study of fracture and
fragmentation in ductile metals at high strain-rates in Eulerian finite volume
simulations. The work is based on an existing diffuse interface method capable
of simulating a broad range of different multi-physics applications, including
multi-material interaction, damage and void opening. The work at hand extends
this method with a technique to model realistic material inhomogeneities, and
examines the performance of the method on a selection of challenging problems.
Material inhomogeneities are included by evolving a scalar field that perturbs
a material's plastic yield stress. This perturbation results in non-uniform
fragments with a measurable statistical distribution, allowing for underlying
defects in a material to be modelled. As the underlying numerical scheme is
three dimensional, parallelisable and multi-physics-capable, the scheme can be
tested on a range of strenuous problems. These problems especially include a
three-dimensional explosively driven fracture study, with an explicitly
resolved condensed phase explosive. The new scheme compares well with both
experiment and previous numerical studies
Simulated Swaption Delta-Hedging in the Lognormal Forward Libor Model
Alternative approaches to hedging swaptions are explored and tested by simulation. Hedging methods implied by the Balck swaption formula are compared with a lognormal forward LIBOR model approach encompassing all the relevant forward rates. The simulation is undertaken within the LIBOR model framework for a range of swaptions and volatility structures. Despite incompatibilities with the model assumptions, the Black method performs equally well as the LIBOR method, yielding very similar distributions for the hedging profit and loss - even at high rehedging frequencies. This result demonstrates the robustness of the Black hedging technique and implies that - being simpler and generally better understood by financial practitioners - it would be the preferred method in practice.term structure of interest rates; hedging; simulation; lognormal forward LIBOR model
PASSWORD-LESS CONTINUOUS MULTIFACTOR AUTHENTICATION (CFMA) FOR WIRELESS NETWORKS
The new generation of wireless networks can involve a mix of radio technologies, especially for industrial environments. As devices roam back and forth between different radio networks, it is very difficult to continually monitor the security posture and identity of devices connected to the network. Presented herein are techniques that involve the combination of a Device-Generated Trust Card and a Network-Generated Trust Card that can be used to validate device identity (e.g., an Internet of Things (IoT) device identity) and behavior using a continuous Multi-Factor Authentication (cMFA) structure
INTELLIGENT NETWORK PROBE ADJUSTMENT BASED ON LEOSAT CONDITIONS
Techniques are presented herein that support the ability to dynamically create, implement, and monitor the performance of network probes in a low Earth orbit (LEO) satellite (LEOsat) deployment such that the probes can alert, as rapidly as possible, to real network and application performance issues while avoiding both the false positive and false negative conditions that are associated with more traditional, static network probe definitions. While such a dynamically defined probing capability would be valuable in any network deployment, it is especially so in a LEOsat deployment with its combination of highly variable delay, jitter, and packet loss, even between two LEOsat users who are in close proximity (due to the unique nature of each LEOsat ground terminal deployment and operating environment)
PASSWORD-LESS CONTINUOUS MULTIFACTOR AUTHENTICATION (CFMA) FOR WIRELESS NETWORKS
The new generation of wireless networks can involve a mix of radio technologies, especially for industrial environments. As devices roam back and forth between different radio networks, it is very difficult to continually monitor the security posture and identity of devices connected to the network. Presented herein are techniques that involve the combination of a Device-Generated Trust Card and a Network-Generated Trust Card that can be used to validate device identity (e.g., an Internet of Things (IoT) device identity) and behavior using a continuous Multi-Factor Authentication (cMFA) structure
INTENT-BASED NETWORKING FROM THE IOT EDGE TO THE APPLICATION SERVER
The dynamic management of traffic within an operational technology (OT) network raises a number of challenges. To address those types of challenges, techniques are presented herein that enable end-to-end intent-based networking to control access between the OT domain and on-premise or cloud-based data center (DC) domains. Aspects of the presented techniques employ deep packet inspection (DPI) of industrial protocols within the OT domain (e.g. by sensors) and map Internet of Things (IoT) devices and traffic flows to abstract tags (through, e.g. a robust security facility), export such tags to a common policy server that bridges both domains, assign the IoT devices to corresponding security profiles (e.g., based on their device characteristics as expressed by tag metadata), and map the security profiles to specific fabric overlay microsegments (e.g., endpoint groups (EPGs)) within a DC or cloud domain
- …